CN102893653A - Managing wireless wide area network bandwidth constraints in a communication network - Google Patents

Managing wireless wide area network bandwidth constraints in a communication network Download PDF

Info

Publication number
CN102893653A
CN102893653A CN2010800667706A CN201080066770A CN102893653A CN 102893653 A CN102893653 A CN 102893653A CN 2010800667706 A CN2010800667706 A CN 2010800667706A CN 201080066770 A CN201080066770 A CN 201080066770A CN 102893653 A CN102893653 A CN 102893653A
Authority
CN
China
Prior art keywords
access
priority
wlan
area network
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2010800667706A
Other languages
Chinese (zh)
Other versions
CN102893653B (en
Inventor
T·马哈拉纳
P·巴塔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Extreme Networks Inc
Original Assignee
Symbol Technologies LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Symbol Technologies LLC filed Critical Symbol Technologies LLC
Publication of CN102893653A publication Critical patent/CN102893653A/en
Application granted granted Critical
Publication of CN102893653B publication Critical patent/CN102893653B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/04Arrangements for maintaining operational condition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0654Management of faults, events, alarms or notifications using network fault recovery
    • H04L41/0659Management of faults, events, alarms or notifications using network fault recovery by isolating or reconfiguring faulty entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/50Network service management, e.g. ensuring proper service fulfilment according to agreements
    • H04L41/5003Managing SLA; Interaction between SLA and QoS
    • H04L41/5019Ensuring fulfilment of SLA
    • H04L41/5022Ensuring fulfilment of SLA by giving priorities, e.g. assigning classes of service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/16Performing reselection for specific purposes
    • H04W36/22Performing reselection for specific purposes for handling the traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/50Allocation or scheduling criteria for wireless resources
    • H04W72/56Allocation or scheduling criteria for wireless resources based on priority criteria

Abstract

A technique to manage wireless wide area network bandwidth constraints in a communication network includes; prioritizing (400) client activities in a serving access point; detecting (402) that wired domain access is inactive while wireless wide area domain access is active; and utilizing (404) an available bandwidth of the wireless aide area domain access for the highest priority client activities. The lower priority client activities can be address in various different ways including transferring to other available wired access.

Description

Wireless wide area network bandwidth constraint in the supervisory communications network
Technical field
The present invention generally relates to cordless communication network, relates more specifically to the wireless wide area network bandwidth constraint in the supervisory communications network.
Background technology
Wireless wide area network (WWAN) and equal IEEE 802.11 cordless communication networks can utilize wired or wireless access support to come to communicate by letter for their user provides, and it is professional that described wireless access is supported between user terminal and the wire/wireless territory call forwarding.Typical wired support can be digital subscriber line (DSL) or the access of other cables.Typical wireless support can for example be the access of the third generation (3G) radio honeycomb.Specifically, the access point of WWAN (AP) is made with user terminal with switch and being communicated by letter, and communication is routed to the wire/wireless territory since then.
At present, the 3G bandwidth is significantly to change, and this may throw into question to processing communication service under specific circumstances.Typical 3G bandwidth is paced up and down at present at 1Mbps, and access point (for example IEEE 802.11n is wireless) can allow each user terminal up to the bandwidth of 300Mbps.Obviously, existence is not mated between wireless access side and the WWAN.Therefore, WWAN greatly depends on access in radio (for example DSL).Yet the fault of access in radio---for example DSL fault---will stay the AP with limited wireless bandwidth for its user terminal of serving.In addition, the recovery of DSL may spend several hours to one day or the longer time.As a result, within the time of WWAN work, AP or wireless exchange board can not make all outer business of WWAN pass through via 3G.At some point, because the 3G interface is bottleneck, AP or switch queue are with saturated and lost packets.Nowadays still there is not mechanism can supply to be used for dealing with this situation.
Some solutions will be under with the situation of WWAN by traffic shaping, rate limit or use based on the packet loss of differentiated services code points and realize, the professional priority that obtains to press the order of sound, video, data, text etc. wherein.Yet, may there be some situations, for example in the shop, the owner wishes that the cash register that he sends data service has the priority higher than customer calls there.Grouping losing not conform in this case and need according to priority, because will causing the client uncontrollably critical data to be used, that remains on higher priority, and because the client can administer all available bandwidth, to cause the traffic of the limit priority in shop is lost, so that the network operation is slow.
Therefore, the new technology of needs is come the radio wide area network bandwidth constraint in the supervisory communications network.
Description of drawings
Accompanying drawing is included in the specification together with following detailed description and consists of the part of specification; be used for further specifying the embodiment of the concept that comprises claimed invention; and a plurality of principle and advantages of those embodiment are described; wherein run through each diagram, similarly Reference numeral represents identical or functionally similar key element.
Fig. 1 is the simplified block diagram of communication network according to an embodiment of the invention.
Fig. 2 is the simplified block diagram of communication network according to another embodiment of the present invention.
Fig. 3 is the simplified block diagram according to the communication network of further embodiment of this invention.
Fig. 4 is the flow chart of the method according to this invention.
It will be understood by those skilled in the art that key element in the accompanying drawing in order to simplify and to know and illustrate, and not necessarily draw in proportion.For example, the size of some key elements may be exaggerated with respect to other key element in the accompanying drawing, to help improve the understanding to the embodiment of the invention.
In suitable situation, the inscape of apparatus and method represents by the ordinary symbol in the accompanying drawing, those specific detail relevant with understanding embodiments of the invention only are shown, in order to avoid those obscure the disclosure to having benefited from the obvious details of those of ordinary skills described herein.
Embodiment
The invention provides innovative techniques and come wireless wide area network bandwidth constraint in the supervisory communications network.Especially, will give preferential treatment to so that the user of task-key keeps connecting and obtain access to the external world via 3G always User Activity.
Fig. 1 is the block diagram that comprises the cordless communication network of wireless wide area network (WWAN) or other IEEE 802.11 wireless communication systems.Yet, will be appreciated that the present invention is also applicable to other wireless communication systems.At present, the standard entity such as OMA (Open Mobile Alliance), 3GPP (third generation partnership projects), 3GPP2 (third generation partnership projects 2) and IEEE (Institute of Electrical and Electric Engineers) 802 is being this class radio telecommunications system research and development standard criterion.The communication system representative may operate at based on the system in the network of different radio technology.For example, following description can be applicable to the access network based on IEEE 802.xx, and this access network adopts IEEE 802.11 for example, 802.16 or 802.20 wireless technology and retrofited to realize embodiments of the invention.
Referring to Fig. 1, be suitable for supporting the block diagram of access point (AP) 100 of the innovative idea of the preferred embodiments of the present invention shown in the figure.Those skilled in that art will recognize that Fig. 1 does not draw the required all-network equipment of System Operation, but only draw those system components and the logic entity relevant especially with the description of this paper embodiment.For example, access point eNodeB or base station can be connected in or comprise one or more equipment, for example wireless domains website (it comprises access point (AN), media access controller (MAC), AP controller and/or switch), base station transceiver station (BTS), base sites controller (BSC), Packet Control Function (PCF), packet control unit (PCU) and/or radio network controller (RNC).Yet neither one illustrates in Fig. 1 specially in these other equipment.
AP 100 is illustrated as in Fig. 1 and comprises the processor 104 that is coupled to transceiver 102 and memory 106.Generally speaking, for example the assembly of processor, memory and transceiver and so on is known.For example, transceiver 102 work with on IEEE 802.11 interfaces with communications of user equipment.In addition, the known infrastructure component that comprises of AP processing unit, for example but be not limited only to microprocessor, microcontroller, memory cache, application-specific integrated circuit (ASIC) (ASIC) and/or logical circuit.This class component usually is suitable for realizing using high-level design languages or describes expression, algorithm and/or agreement that the use computer instruction represents or that use a message logic flowcharting.
Thereby, given algorithm, logic flow, a message/signaling stream and/or protocol specification, those skilled in the art will know can be for many design and development technology of the AP processor of realizing the given logic of execution.Thereby AP 100 expressions are suitable for realizing the known devices of various embodiment of the present invention according to description herein.In addition, those skilled in the art will recognize that each aspect of the present invention can realize or stride these physical assemblies and realize in each physical assemblies, and all be not necessarily limited to the single platform realization.For example, AP of the present invention aspect can realize in any equipment listed earlier, or be distributed on these assemblies.Following situation also drops within the conception of the present invention: operational requirements of the present invention can software, firmware or hardware are realized, and practical function only is preferred option in software processor (or digital signal processor).
AP 100 uses local wireless interface and a plurality of subscriber equipment or subscriber station (user A ... user D) 116-122 communication.Local wireless interface is corresponding to the forward link that uses in the communication between user and the AP and reverse link.The consumer electronic platform of the known finger wide range of subscriber station or remote unit platforms, such as mobile radio station, mobile unit, mobile node, subscriber equipment, subscriber device, subscriber station, access terminal, remote terminal, terminal equipment, game station, personal computer and personal digital assistant etc., they all are called as client devices in this article.Therefore especially, each client devices comprises processor, and this processor can be coupled to transceiver, antenna, keyboard, loud speaker, microphone and display, and this is known and be not illustrated out in the industry.
The known basic module that comprises of client devices is such as but not limited to microprocessor, digital signal processor (DSP), microcontroller, memory device, application-specific integrated circuit (ASIC) and/or logical circuit.This kind equipment usually is suitable for realizing using high-level design languages or describes expression, algorithm and/or agreement that the use computer instruction represents or that use a message/signaling flowcharting and/or use logical flow chart to represent.Thereby, given algorithm, logic flow, message/signaling stream, call-flow and/or protocol specification, those skilled in the art will know can be for many design and development technology of the subscriber equipment of realizing the given logic of execution.
The invention provides multiple technologies with when access in radio is lost with the limited allocated bandwidth of available wide area access to the limit priority client activity." client activity " used herein can comprise client devices and the application that operates on the client devices.In operation, the present invention keeps limit priority or key client's machine movable, and shifts or stop lower priority or non-key client activity.
Refer back to Fig. 1, illustrate the first embodiment of the present invention, this embodiment has introduced the concept of the flexible beacon of WLAN (wireless local area network).Specifically, provide the AP 100 of service the priority of client activity or equipment can be divided into movable and lower priority (non-key) activity of limit priority (key), these activities can be stored in the memory 106.For example, use the example in shop, front, provide and control under the situation of Service Access Point the storekeeper, the storekeeper can shift to its cash handler's machine data the limit priority of the audio call that exceed any client.Priority can be assigned to equipment itself or distribute to special activity on the equipment, and for example equipment can be E911 and calls out high priority is provided, and provides low priority to normal audio call.In case determine the priority of activity and/or equipment, the storekeeper can provide two or more WLAN (wireless local area network) (WLAN) for the client activity of those high priorities (key) and the client activity of those low priorities (non-key).
As shown in the figure, AP 100 supports key service WLAN 112 and one or more non-critical services WLAN 114 now.The client activity of limit priority (user A 116, user B 118), for example storekeeper's cash register or printer are movable, are assigned to crucial WLAN 112.The client activity of lower priority (user C 120, user D 122), cell phone or the laptop computer of for example accessing the consumer are assigned to non-key WLAN 114.According to the present invention, non-key WLAN allows to be operated under the flexible beacon of AP 100.Specifically, when detecting being connected of AP100 wired with it (for example DSL 108) access, the processor 104 of AP 100 128 lost efficacy but when wireless wide-area access (WWAN) 110 had available connection 130, then AP 100 is transferred to the communication 126 of the client activity among its crucial WLAN 112 3G connection 130 and goes to WWAN 110, and simultaneously AP 100 will stop at least one beacon in the WLAN 114 non-key, that allow flexible beacon, stop thus with noncritical activity (user C 120, user D 122) communicate by letter 124.The equipment of these non-key client activity that preferably, operation plan stops can at first be removed authentication by AP 100.
More preferably, if the 3G connection 130 of WWAN 110 is had the bandwidth of processing than by the more activity of use activity of crucial WLAN 112, then it may not need to stop all non-key WLAN114 or activities.Specifically, in case DSL fault, all AP provide the activity of service can be transferred to the 3G connection, if but the grouping number of losing from the formation that is in relation to 3G interface 130 exceeds a predetermined threshold, this will trigger stopping of one or more non-key WLAN 114, as previously mentioned, thus dynamically maximize the WWAN bandwidth and do not make its excess load and lose key business.
At this moment, AP has the ability (being the keystone resources monitoring) of monitoring cable port, in case and the DSL service recovery, the AP default gateway returns to access in radio, and beacon will begin beacon on again dynamically to enable non-key WLANS 114 flexibly.
Fig. 2 illustrates another embodiment of the present invention.In this case, have the 2nd an available AP200, it has the configuration identical with an AP 100 and has access in radio 230 and possible WWAN access 110.Preferably, an AP 100 and the 2nd AP 200 keep in couples and can be similarly, although these are not essential.Equally, AP 100 has at least one and allows flexible beacon, non-key WLAN 114 (crucial WLAN is not illustrated).The example that connects 128 same scene of stopping using for the DSL of an AP 100 as previously mentioned, the client devices non-key, lowest priority of at least one WLAN 114 can obtain to remove from an AP 100 grouping of authentication, and this will stop the beacon on of WLAN114.Client activity non-key, lowest priority (user C 120 is connected with user D) is forced to roam to the WLAN 212 of the 2nd AP 200 that still has DSL connection 230 subsequently.So, can proceed by the DSL connection 230,108 of the 2nd AP 200 from the communication 226 of client activity (user C 120 is connected with user D).The movable (not shown) of key client's machine can still communicate by letter 126,130 via an AP 100 with WWAN 110, such as the front for as described in Fig. 1.
Fig. 3 illustrates another embodiment of the present invention.In this case, have the 2nd an available AP200, it has with the backhaul of an AP 100 and is connected (for example mesh network), and has access in radio 230 and possible WWAN access 110.Equally, AP 100 can have at least one and allows flexible beacon, non-key WLAN 114 (crucial WLAN is not illustrated).The example that connects 128 same scene of stopping using for the DSL of an AP 100 as previously mentioned, the client devices non-key, lowest priority of at least one WLAN 114 can obtain to remove from an AP 100 grouping of authentication, and this will stop the beacon on of WLAN114.Client activity non-key, lowest priority (user C, D, E, F 120,122,320,322) is then via the access in radio 230 among backhaul bridge 300 forced roamings to the two AP 200 between the AP 100 that service is provided and the 2nd AP 200, i.e. non-key client activities are again set up with the client computer bridge and contacted.So, can proceed by the DSL connection 230,108 of the 2nd AP 200 via bridge 300 from the communication 324 of client activity.The movable (not shown) of key client's machine can still communicate by letter 130 via an AP 100 with WWAN 110, such as the front for as described in Fig. 1.
Selectively, the configuration of Fig. 3 can be used for balancing dynamic load, and each access point of taking this under the mesh mode can make its non-key client activity load balance between base station bridge and client computer bridge.Specifically; when DSL is connected to when shutting down on the bridge of base station; AP 100 can remove authentication to half client activity on the non-key WLAN 314 (user C 120 and user D 122); and force to make these client activity roam to the client computer bridge; and second half non-key (and/or crucial) client activity (user E 320 and user F 322) can be used 3G interface 130,110; obtain thus business less on the 3G interface and load balance, because the 2nd AP 299 has than AP 100 business still less that service is provided.
Fig. 4 illustrates the flow chart according to the method for the wireless wide area network bandwidth constraint in the supervisory communications network of the present invention.
The method starts from providing the access point of service to determine client activity and/or priority facility.It is definite that everyone of anticipation access point (AP) will control this priority.Although determine that the priority of client devices is the easiest, however because client activity may be in relation to particular device, therefore will be appreciated that client devices can carry out different movable and only determine that the priority of the activity on the equipment is useful.Preferably, but the client devices Priority-based is partitioned into different WLAN (wireless local area network) (WLAN), for example critical activity is grouped among the WLAN and with noncritical activity and divides into groups into one or more other WLAN.So, priority assignment can be given a WLAN, and wherein all activity.Selectively, the priority of determining client activity can be dependent on the intraday time and dynamically changes.For example, from the morning 9:00 to 5:00 in afternoon, cash register will have high priority, but from afternoon 5:00 to 10:00 in afternoon, back-up system will have higher priority.According to the present invention, allow non-key WLAN to make its beacon stop (being flexible beacon), as hereinafter will describing in detail.
When wireless wide-area access activity, by detecting stopping using of 402 wired territory accesses, AP starts working.In other words, the fault during for example DSL connects will cause the fault to movable WWAN territory to shift.This fault also may cause in case of necessity stopping non-key WLAN beacon on.
If AP detects wired domain browsing fault, then AP is used for the available bandwidth of WWAN territory access the client activity of 404 limit priorities.Preferably, the limit priority activity is grouped together in the equipment of the upper work of crucial WLAN.The lowest priority activity can be stopped or shift.More preferably, if connection has the bandwidth of processing than by the more activity of use activity of crucial WLAN to WWAN, then it may not need to stop all non-key activities.Specifically, when the DSL fault occured, all activities can be transferred to WWAN and connect, if but exceed a predetermined threshold from the packet count that the formation that is in relation to the WWAN interface is lost, then will trigger stopping of WLAN.
A kind of technology that stops client activity is that authentication 406 is removed in the client devices/activity on the non-key WLAN.Can so do for each client devices on the specific non-key WLAN or armamentarium.Can be subsequently by stopping to this WLAN beacon on 408 specific WLAN being stopped, because WLAN can respond to flexible beacon.Critical activity can continue to communicate by letter at WWAN.
A kind of technology that stops client activity also can be removed authentication 406 to the client devices/activity on the non-key WLAN.Can so do for each client devices on the specific non-key WLAN or armamentarium.Specific WLAN can stop by this WLAN is stopped beacon on 408, this force 410 make the lowest priority client activity via the WLAN roaming in the second wireless network to other available access in radios.Critical activity can continue to communicate by letter at WWAN.
The another technology that stops client activity also can be removed authentication 406 to the client devices/activity on the non-key WLAN.Can so do for each client devices on the specific non-key WLAN or armamentarium.Specific WLAN can stop by this WLAN is stopped beacon on 408, and this forces 412 to make the lowest priority client activity roam to other available access in radios via the backhaul bridge between the access point that service is provided and the second access point.Critical activity can continue to communicate by letter at WWAN.
Selectively, can be used for balancing dynamic load via the pressure 412 of backhaul bridge, take this each access point under the mesh mode and can make its non-key client activity between base station bridge and client computer bridge load balance that becomes.Specifically, when DSL is connected to when falling on the bridge of base station, AP can remove authentication 406 to the part on the non-key WLAN (for example half) client activity, and force to make these client activity roam to the client computer bridge, and the non-key client activity of another part (for example half) can use WWAN to connect.
Specific embodiment has been described in above-mentioned specification.Yet, those skilled in the art will appreciate that and can make various modifications and change, and do not deviate from the scope of the present invention of stating in the appended claim.Therefore, specification and accompanying drawing are treated the meaning of meaning following the instructions rather than restriction, and all these type of modifications are intended to be comprised in the scope of this teaching.
These benefits, advantage, solution of problem scheme and any key element that can make any benefit, advantage or solution generation or become more outstanding should not be interpreted as the key of any or all claim, feature essential or essence or key element.The present invention only is defined by the following claims, and claims are included in any modification of making during the application's pending trial and those authorize all equivalents of claims.
In addition, in this article, relational terms such as first and second, top and bottom etc. only is used for an entity or action separate with another entity or active region, and not necessarily require or hint this type of entity or move between this relation or sequentially of any reality.Term " comprises ", " comprising ... ", " having ", " having ... " " containing ", " containing ... ", " comprising ", " comprising ... " or its arbitrarily other modification be intended to cover non-exclusive comprising not only comprise those key elements but also comprise other key element or these processes, method, the article of clearly not listing or install other intrinsic key element so that comprise, have, contain, comprise process, method, article or the device of a series of key elements.Follow the key element of " comprising ... one ", " having ... one ", " containing ... one ", " comprising ... one " and do not got rid of the additional identical element of existence in process, method, goods or the device that comprises, has, contains, comprises this key element, and without more restrictions.Term " one " and " one " are defined as one or more, unless this paper indicates clearly in addition.Term " basically ", " in essence ", " nearly ", " pact " or its any other version be defined as one of ordinary skill in the understanding " close to ", and in a non-limiting example, this term is defined in 10%, in another embodiment in 5%, in another embodiment in 1%, and in another embodiment in 0.5%.Employed term " coupling " is defined as " connection " in this article, although not necessarily directly connect and not necessarily mechanically connect.The equipment of " configuration " or structure dispose in this mode at least in some way, but also may dispose in the unlisted mode of this paper.
To understand, some embodiment can be comprised of the program command (comprising software and firmware) of one or more universal or special processors (or " treatment facility ") and unique storage, wherein one or more universal or special processor such as microprocessors, digital signal processor, customized processor and field programmable gate array (FPGA) etc., and program command control above-mentioned one or more processor with the method that realizes in conjunction with some non-processor circuit describing herein and/or device some, great majority or repertoire.Alternatively, some or all functions can be realized by the state machine of the program command that does not have storage, or in one or more application-specific integrated circuit (ASIC)s (ASIC), realize, in one or more application-specific integrated circuit (ASIC)s (ASIC), each function of these functions or some combinations of some function can be implemented as customized logic.Certainly, can use the combination of two kinds of methods.
In addition, embodiment can be implemented as computer-readable recording medium, stores computer-readable code on this computer-readable recording medium, is used for computer (for example comprising processor) programming is described and claimed method to carry out such as this paper.The example of this type of computer-readable recording medium includes but not limited to hard disk, CD-ROM, optical storage apparatus, magnetic storage apparatus, ROM(read-only memory), the PROM(programmable read only memory), the EPROM(Erasable Programmable Read Only Memory EPROM), the EEPROM(Electrically Erasable Read Only Memory) and flash memory.Moreover, be expected under the guiding of concept disclosed herein and principle, those skilled in the art can in the situation that need not significantly to make great efforts potentially and be subjected to many design alternatives that for example up duration, current techniques and economic consideration inspire, easily produce this type of software instruction and program and IC by minimum experiment.
The book extract that furnishes an explanation is in order to allow the reader to find out rapidly the disclosed essence of present technique.Should be understood that it will be not used in scope or the implication of understanding or limiting claim.In addition, as seen, more smooth for making the disclosure in aforesaid detailed description, can be with various Feature Grouping in a plurality of embodiment.Method of the present disclosure is not to be read as the following intention of reflection: embodiment required for protection need to be than the more feature of feature of clearly explaining in each claim.On the contrary, such as the claims reflection, subject matter can be the whole features feature still less than single disclosed embodiment.Therefore, claims are included in the detailed description at this, and wherein each claim is alone as independent claimed theme.
Claims (according to the modification of the 19th of treaty)
1. the method for the wireless wide area network bandwidth constraint in the supervisory communications network, described method comprises:
Determine the priority of client activities by the access point that service is provided, wherein said definite priority comprises based on the priority of client activity and WLAN (wireless local area network) distributes to different WLAN (wireless local area network) with client activity;
Detection is invalid in the effective simultaneously wired territory access of wireless wide-area access;
In response to detect described wireless wide-area access effectively simultaneously described wired territory access be invalid, for the available bandwidth that is assigned with limit priority client activity in the WLAN (wireless local area network) of giving the limit priority client activity and utilizes described wireless wide-area access; And
Remaining wireless local is moved at least one client devices of lowest priority client activity on the net and remove authentication.
2. the method for claim 1 is characterized in that, described client activity is in relation to the specific wireless local area network (LAN) so that the specific wireless local area network (LAN) has a priority of associated.
3. the method for claim 1 is characterized in that, described all the other WLAN (wireless local area network) allow beacon is stopped to respond, and further comprise beacon at least one that stops in all the other WLAN (wireless local area network).
4. method as claimed in claim 3 is characterized in that, in case the packet count of losing to the formation of described wireless wide-area access from described WLAN (wireless local area network) exceeds a threshold value, the beacon that then triggers WLAN (wireless local area network) stops.
5. method as claimed in claim 3 is characterized in that, in case detect the fault in the access of wired territory, then the beacon of WLAN (wireless local area network) stops to be triggered.
6. the method for claim 1 is characterized in that, also comprises the client activity of described lowest priority is removed authentication.
7. method as claimed in claim 6, it is characterized in that, described WLAN (wireless local area network) is configured to beacon is stopped to respond, and comprises that further the client activity that forces described lowest priority roams to other the available access in radios in the second wireless network.
8. method as claimed in claim 6 is characterized in that, comprises that also the client activity that forces described lowest priority roams to access in radio in the second access point via the described access point that service is provided and the backhaul bridge between described the second access point.
9. the method for claim 1 is characterized in that, determines that the priority of client activity can be dependent on the intraday time and dynamically change.
10. a work comprises in order to the access point of the wireless wide area network bandwidth constraint in the management communication network network:
The transceiver of work in order to communicate by letter with client devices; And
Be coupled to the processor of described transceiver, described processor is done in order to determine the priority of client activity, described definite priority comprises based on the priority of client activity and WLAN (wireless local area network) distributes to different WLAN (wireless local area network) with client activity, detection is invalid in the effective simultaneously wired territory access of wireless wide-area access, it is invalid accessing in the effective simultaneously described wired territory of described wireless wide-area access in response to detection, the client activity that is assigned with the limit priority in the WLAN (wireless local area network) of giving the limit priority client activity is utilized the available bandwidth of described wireless wide-area access, and remaining wireless local is moved at least one client devices releasing authentication of lowest priority client activity on the net.
11. access point as claimed in claim 10 is characterized in that, also comprises the memory that is coupled to described processor, the association between described memory stores priority, client devices, client activity and the WLAN (wireless local area network).
12. a work comprises in order to the system of the wireless wide area network bandwidth constraint in the management communication network network:
The access of wired territory;
The wireless wide-area access; And
Access point, it is done in order to determine client activity priority, wherein said definite priority comprises based on the priority of client activity and WLAN (wireless local area network) distributes to different WLAN (wireless local area network) with client activity, detection is invalid in the effective simultaneously wired territory access of wireless wide-area access, it is invalid accessing in the effective simultaneously described wired territory of described wireless wide-area access in response to detection, the client activity that is assigned with the limit priority in the WLAN (wireless local area network) of giving the limit priority client activity is utilized the available bandwidth of described wireless wide-area access, and remaining wireless local is moved at least one client devices releasing authentication of lowest priority client activity on the net.

Claims (15)

1. the method for the wireless wide area network bandwidth constraint in the supervisory communications network, described method comprises:
Determine the priority of client activities by the access point that service is provided;
Detection is invalid in the effective simultaneously wired territory access of wireless wide-area access; And
Utilize the available bandwidth of described wireless wide-area access for the limit priority client activity.
2. the method for claim 1 is characterized in that, described client activity is in relation to specific equipment.
3. method as claimed in claim 2, it is characterized in that, described definite priority comprises that Priority-based is partitioned into different WLAN (wireless local area network) with client devices, and described utilization comprises the available bandwidth that the client activity in the described limit priority WLAN (wireless local area network) is utilized described wireless wide-area access.
4. method as claimed in claim 3 is characterized in that, described client activity is in relation to the specific wireless local area network (LAN) so that the specific wireless local area network (LAN) has a priority of associated.
5. method as claimed in claim 3 is characterized in that, also comprises at least one online client devices of all the other wireless locals is removed authentication.
6. method as claimed in claim 5 is characterized in that, described all the other WLAN (wireless local area network) allow beacon is stopped to respond, and further comprise beacon at least one that stops in all the other WLAN (wireless local area network).
7. method as claimed in claim 6 is characterized in that, in case the packet count of losing to the formation of described wireless wide-area access from described WLAN (wireless local area network) exceeds a threshold value, the beacon that then triggers WLAN (wireless local area network) stops.
8. method as claimed in claim 6 is characterized in that, in case detect the fault in the access of wired territory, then the beacon of WLAN (wireless local area network) stops to be triggered.
9. the method for claim 1 is characterized in that, also comprises the client activity of described lowest priority is removed authentication.
10. method as claimed in claim 9, it is characterized in that, described WLAN (wireless local area network) is configured to beacon is stopped to respond, and comprises that further the client activity that forces described lowest priority roams to other the available access in radios in the second wireless network.
11. method as claimed in claim 9 is characterized in that, comprises that also the client activity that forces described lowest priority roams to access in radio in the second access point via the described access point that service is provided and the backhaul bridge between described the second access point.
12. the method for claim 1 is characterized in that, determines that the priority of client activity can be dependent on the intraday time and dynamically change.
13. a work comprises in order to the access point of the wireless wide area network bandwidth constraint in the management communication network network:
The transceiver of work in order to communicate by letter with client devices; And
Be coupled to the processor of described transceiver, described processor is done in order to determine the priority of client activity, detection is invalid in the effective simultaneously wired territory access of wireless wide-area access, and the client activity of limit priority is utilized the available bandwidth of described wireless wide-area access.
14. access point as claimed in claim 13 is characterized in that, also comprises the memory that is coupled to described processor, the association between described memory stores priority, client devices, client activity and the WLAN (wireless local area network).
15. a work comprises in order to the system of the wireless wide area network bandwidth constraint in the management communication network network:
The access of wired territory;
The wireless wide-area access; And
Access point, it is done in order to determine client activity priority, and it is invalid detecting in the effective simultaneously wired territory access of wireless wide-area access, and the client activity of limit priority is utilized the available bandwidth of described wireless wide-area access.
CN201080066770.6A 2010-05-14 2010-12-27 Wireless wide area network bandwidth constraint in supervisory communications network Active CN102893653B (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US12/780,091 US8798000B2 (en) 2010-05-14 2010-05-14 Managing wireless wide area network bandwidth constraints in a communication network
US12/780,091 2010-05-14
PCT/US2010/062140 WO2011142786A1 (en) 2010-05-14 2010-12-27 Managing wireless wide area network bandwidth constraints in a communication network

Publications (2)

Publication Number Publication Date
CN102893653A true CN102893653A (en) 2013-01-23
CN102893653B CN102893653B (en) 2015-08-26

Family

ID=43827112

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201080066770.6A Active CN102893653B (en) 2010-05-14 2010-12-27 Wireless wide area network bandwidth constraint in supervisory communications network

Country Status (4)

Country Link
US (1) US8798000B2 (en)
EP (1) EP2569975B1 (en)
CN (1) CN102893653B (en)
WO (1) WO2011142786A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014113948A1 (en) * 2013-01-24 2014-07-31 Hewlett-Packard Development Company, L.P. Limiting access to service providers based on the network traffic load of a wireless access point

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9882594B2 (en) 2012-09-21 2018-01-30 Apple Inc. Apparatus and methods for controlled switching of electronic access clients without requiring network access
US10009764B2 (en) 2012-09-21 2018-06-26 Apple Inc. Apparatus and methods for controlled switching of electronic access clients without requiring network access
CN104641669B (en) * 2012-09-21 2019-03-01 苹果公司 The device and method of control switching for the electronic access client in the case where not requiring network to access
EP2739093A1 (en) 2012-11-29 2014-06-04 British Telecommunications public limited company Restoration of network access
EP2739081A1 (en) * 2012-11-29 2014-06-04 British Telecommunications public limited company Network access restoration
US20150365244A1 (en) 2013-02-22 2015-12-17 Unify Gmbh & Co. Kg Method for controlling data streams of a virtual session with multiple participants, collaboration server, computer program, computer program product, and digital storage medium
US9065811B2 (en) 2013-04-04 2015-06-23 Ericsson Television Inc. Methods, apparatus, and computer program products for communicating content files based on destination priority
US9167453B2 (en) 2013-11-25 2015-10-20 At&T Intellectual Property I, L.P. Cell and evolved node B station outage restoration tool
US9763137B2 (en) * 2013-12-13 2017-09-12 Cable Television Laboratories, Inc. Predictive load balancing
US10313528B2 (en) 2014-03-26 2019-06-04 Genband Us Llc Systems, methods, and computer program products for providing regional survivable calling over a packet network
CN105894757A (en) * 2016-05-09 2016-08-24 浙江大华技术股份有限公司 Method and device for reporting alarm information from alarm terminal to server and alarm terminal
US10530604B1 (en) * 2017-05-16 2020-01-07 Mbit Wireless, Inc. Method and apparatus for sharing broadband communication services
US10389547B1 (en) * 2017-05-16 2019-08-20 Mbit Wireless, Inc. Method and apparatus for sharing broadband communication services

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050053046A1 (en) * 2003-09-10 2005-03-10 Shiwei Wang QoS based load-balance policy for WLAN
EP1562390A1 (en) * 2004-02-09 2005-08-10 Alcatel High availability broadband connections through switching from wireline to diverse wireless network
CN1863114A (en) * 2005-09-01 2006-11-15 华为技术有限公司 Wired and wireless integrated access network communication system

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6925094B2 (en) * 2002-09-23 2005-08-02 Symbol Technologies, Inc. System and method for wireless network channel management
US7590075B2 (en) * 2005-04-15 2009-09-15 Dell Products L.P. Systems and methods for managing wireless communication
US7474615B2 (en) * 2005-07-11 2009-01-06 Dell Products L.P. Network optimization based on traffic prioritization
US7551641B2 (en) * 2005-07-26 2009-06-23 Dell Products L.P. Systems and methods for distribution of wireless network access
US20070160016A1 (en) * 2006-01-09 2007-07-12 Amit Jain System and method for clustering wireless devices in a wireless network
US7907561B2 (en) * 2006-02-28 2011-03-15 Dell Products L.P. System and method for integrating devices into a wireless network
US7720464B2 (en) * 2006-03-28 2010-05-18 Symbol Technologies, Inc. System and method for providing differentiated service levels to wireless devices in a wireless network
US8339991B2 (en) * 2007-03-01 2012-12-25 Meraki, Inc. Node self-configuration and operation in a wireless network
US7826428B2 (en) * 2007-12-05 2010-11-02 Symbol Technologies, Inc. Associating a wireless computing device with a different access point
US8134587B2 (en) * 2008-02-21 2012-03-13 Microsoft Corporation Aggregation of video receiving capabilities
US8009560B2 (en) * 2008-12-31 2011-08-30 Microsoft Corporation Detecting and managing congestion on a shared network link
US20100296499A1 (en) * 2009-05-22 2010-11-25 Jeyhan Karaoguz Communicatively coupling wlan and femtocell networks utilizing a femtocell-to-wlan network bridge and controller
EP2381734B1 (en) * 2010-04-20 2012-06-20 Research In Motion Limited Handling QOS flows when moving between systems

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050053046A1 (en) * 2003-09-10 2005-03-10 Shiwei Wang QoS based load-balance policy for WLAN
EP1562390A1 (en) * 2004-02-09 2005-08-10 Alcatel High availability broadband connections through switching from wireline to diverse wireless network
CN1863114A (en) * 2005-09-01 2006-11-15 华为技术有限公司 Wired and wireless integrated access network communication system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014113948A1 (en) * 2013-01-24 2014-07-31 Hewlett-Packard Development Company, L.P. Limiting access to service providers based on the network traffic load of a wireless access point
US10021591B2 (en) 2013-01-24 2018-07-10 Hewlett Packard Enterprise Development Lp Limiting access to service providers based on the network traffic load of a wireless access point

Also Published As

Publication number Publication date
US8798000B2 (en) 2014-08-05
EP2569975A1 (en) 2013-03-20
WO2011142786A1 (en) 2011-11-17
CN102893653B (en) 2015-08-26
EP2569975B1 (en) 2018-10-24
US20110280118A1 (en) 2011-11-17

Similar Documents

Publication Publication Date Title
CN102893653B (en) Wireless wide area network bandwidth constraint in supervisory communications network
CN101480103B (en) Method of operating a dual SIM wireless communications device
CN102640471B (en) Method and apparatus for multipath communication
WO2006132831A3 (en) Wireless communication network security method and system
US20020160820A1 (en) Enhance mobility of a bluetooth headset beyond the reach supported by bluetooth
EP3197117B1 (en) Communication processor, method of implementing volte, mobile terminal, data card
CN102845108A (en) Communications system
WO2021008377A1 (en) Communication method and apparatus
JP6503452B2 (en) Cloud based access network
CN103167475A (en) Virtual modem suspension handler in a multiple sim user equipement
US20090116466A1 (en) Mobile communications
CN104469694A (en) Communication method and device based on clustering system
CN102111790A (en) Communication method, device and system based on base station control equipment group
CN101541096A (en) A interface IP-based local exchange method and equipment thereof
WO2011079721A1 (en) Communication method and local management system
CN101977410A (en) Method and device for dual-network and dual-standby terminal to perform communication
CN108476212A (en) Dynamic wlan connections
WO2012106856A1 (en) Communication method for dual network dual standby terminal and apparatus thereof
CN101039263B (en) Method for processing node overload of core network and mobile switch equipment and communication system
JP2004247801A (en) Mobile communication system, mobile switching station for the system, and mobile station for the system
WO2012163113A1 (en) Method and device for data service protection
CN102820992A (en) Processing method and device of data packets
CN101860942A (en) Method for distinguishing terminal access mode
JP5562317B2 (en) Wireless communication system and session sharing method
CN102137492B (en) Method and device for video processing telephone service in single-card double standby system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C56 Change in the name or address of the patentee
CP01 Change in the name or title of a patent holder

Address after: American New York

Patentee after: MOTOROLA SOLUTIONS INC

Address before: American New York

Patentee before: Symbol Technologies Co., Ltd.

C41 Transfer of patent application or patent right or utility model
TR01 Transfer of patent right

Effective date of registration: 20170109

Address after: American California

Patentee after: Extreme Networks Inc

Address before: American New York

Patentee before: MOTOROLA SOLUTIONS INC